Malin De Silva

Friday, November 16, 2018

Azure is always try to ease up your data as much as confidential
and secure. To improve much more Azure is introducing Customer Lockbox for
Microsoft Azure.

What it does:

Customer Lockbox for Microsoft Azure is a service which is integrated
into Azure portal.It gives you explicit control in the very rare instance when
a Microsoft Support Engineer may need access to your data to resolve an issue.

Some instances may occur where a Microsoft Microsoft Support
Engineer requires elevated permissions to resolve this issue such like debugging
remote access issue.On that scenario Microsoft engineers use just-in-time
access service that provides limited, time-bound authorization with access
limited to the service.

Friday, November 2, 2018

Microsoft Azure team has released a useful tool for Azure
Kubernetes Service (AKS) called Azure Monitor - container health
monitoring capability. And it’s in public preview right now and developers are
welcome to work on it. This will Enables to developers to track the health and
performance of your Azure Kubernetes Service (AKS) cluster. Later,
Microsoft will release new features and updates to onboarding and
the portal experience.

What is Azure Monitor for container

Azure Monitor for containers works as the performance
visibility by collecting memory and processor metrics from controllers, nodes,
and containers that are available in Kubernetes through the Metrics API and
Logs even. After User enable monitoring from Kubernetes clusters, these metrics
and logs are automatically collected for you through a containerized version of
the Log Analytics agent for Linux and stored in your Log Analytics workspace.

Friday, October 26, 2018

In Microsoft Ignite Microsoft VM team have announced number
of services and products that they are going to launch in near future. And one
of its service was public
preview of Azure Monitor for VMs which provides an in-depth view of VM health,
performance trends, and dependencies.

How to access?

To
view Azure Monitor for VMs, navigate to Azure VM resource blade and view
details about VMs. From there users can identify compute issues at scale, and
from the Resource Group blade to understand whether all the VMs in a common
deployment are behaving as you expect.

Sunday, October 14, 2018

Windows Azure were more popular in creating VMs (Virtual
Machines) in your cloud and login remotely to them and access them as remotely.
By the time Microsoft has implemented number of images (OS) to install in to
it. Now they are expanding the ability to create images by users or customers.
They have introduced the private preview of Azure VM Image Builder, a service
which allows users to have an image building pipeline in Azure. To configure
the image creation set up with Azure VM Image Builder, you can take an ISO or
Azure Marketplace image and start creating your own golden images in a few
steps.

Monday, October 8, 2018

In the earliest era of Microsoft there were huge struggle to increase
the scalability and performance. People / Users asked several times to scale
the products without decreasing performance or security. So this led Microsoft
to build large, enterprise grade network and application infrastructure to
solve reliability, scalability, performance and agility problems and took
around 10 years via cloud journey. The result was the y made some enterprise
services from Bing, Office, Skype, Azure, etc to overcome those challenges. And
it led to developing unique infrastructure and services, battle-tested by
years of constant support for Microsoft’s largest businesses.

Now they are releasing another huge project called Azure
Front Door Service and its enterprise-gradeservice
and the public preview of newest addition to the Azure Networking and Azure’s
application delivery suite of products. It is highly secure and highly
available entry point for delivering your high performance global hyperscale
apps.

Sunday, September 30, 2018

As
Microsoft started to transform VSTS in to Azure DevOps Azure boards does a
tremendous work on it. It manages all the work for your software project and brining
you a rich set of capabilities including native support for Scrum and Kanban,
customizable dashboards, and integrated reporting.

You
will get a basic idea that what can do with azure boards.

Work items

Work item is the
artifact which runs behind the task tracking. You can create your task items
according to your project and the team. Each
work item uses a state model to track and communicate progress. As an example
the states model is New > Active > Resolved > Closed. From using this
display anyone has access to the project work items can view the progress of
the project.

Friday, September 28, 2018

What is Proof-of-Authority

This is called a Sybil-resistance mechanism. This is reducing
computation costs to self-regulate the network and allow fair participation.
This is more suitable when there is a competition for cryptocurrency promotes
security on the network, anonymously and open networks. But in private networks
it doesn’t have any value of it. As an alternative it has a protocol Proof-of-Authority,
is more suitable for permissioned networks which consensus participants are
known and reputable. No need of mining and Proof-of-Authority is more efficient
while still retaining Byzantine fault tolerance.

How it works in Enterprise

Microsoft has created this solution with the same principles that they
use to create all their products and services. Using Proof-of-Authority, each
and every consensus node on the network has its own Ethereum identity. Whenever
a node goes down, and member shouldn’t lose the consensus participation. Which
means every member needs to run redundant consensus nodes because of highly
available network presence. To ensure highly available network presence
Microsoft has built an abstraction which allows each consensus participant to
delegate multiple nodes to run on their behalf. Each Azure Proof-of-Authority
network comes with our identity leasing system that ensures that no two nodes
carry the same identity. In the case of a VM or regional outage, new nodes can
quickly spin up and resume the previous nodes’ identities.